IOC Report
WgGo0xd2p8.exe

loading gif

Files

File Path
Type
Category
Malicious
WgGo0xd2p8.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WgGo0xd2p8.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpF899.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\OZIxXQGIP.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\OZIxXQGIP.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OZIxXQGIP.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1hhbb1ex.w3j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nk3x3dcd.2fx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vbgpbqad.pdp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yi0tsd5p.bvj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\ahiyfsrtumxshhzchfxyuhtwwlmtoinvo
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvB17E.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x06969fbe, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\tmp904.tmp
XML 1.0 document, ASCII text
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WgGo0xd2p8.exe
"C:\Users\user\Desktop\WgGo0xd2p8.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OZIxXQGIP.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OZIxXQGIP" /XML "C:\Users\user\AppData\Local\Temp\tmpF899.tmp"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Desktop\WgGo0xd2p8.exe
"C:\Users\user\Desktop\WgGo0xd2p8.exe"
malicious
C:\Users\user\AppData\Roaming\OZIxXQGIP.exe
C:\Users\user\AppData\Roaming\OZIxXQGIP.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OZIxXQGIP" /XML "C:\Users\user\AppData\Local\Temp\tmp904.tmp"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\AppData\Roaming\OZIxXQGIP.exe
"C:\Users\user\AppData\Roaming\OZIxXQGIP.exe"
malicious
C:\Users\user\Desktop\WgGo0xd2p8.exe
C:\Users\user\Desktop\WgGo0xd2p8.exe /stext "C:\Users\user\AppData\Local\Temp\ahiyfsrtumxshhzchfxyuhtwwlmtoinvo"
malicious
C:\Users\user\Desktop\WgGo0xd2p8.exe
C:\Users\user\Desktop\WgGo0xd2p8.exe /stext "C:\Users\user\AppData\Local\Temp\cbnjg"
malicious
C:\Users\user\Desktop\WgGo0xd2p8.exe
C:\Users\user\Desktop\WgGo0xd2p8.exe /stext "C:\Users\user\AppData\Local\Temp\mwtbgvmgw"
malicious
C:\Users\user\Desktop\WgGo0xd2p8.exe
C:\Users\user\Desktop\WgGo0xd2p8.exe /stext "C:\Users\user\AppData\Local\Temp\mwtbgvmgw"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.fontbureau.com/designersG
unknown
http://www.imvu.comr
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
unknown
https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
unknown
http://www.fontbureau.com/designers?
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
unknown
http://www.elderscrolls.com/skyrim/characterT
unknown
http://www.goodfont.co.kr
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://www.google.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://www.elderscrolls.com/skyrim/player
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.ascendercorp.com/typedesigners.html
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
unknown
https://login.yahoo.com/config/login
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.nirsoft.net/
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://www.office.com/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://www.carterandcone.coml
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://geoplugin.net/
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
unknown
http://www.elderscrolls.com/skyrim/character
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
unknown
https://www.google.com/accounts/servicelogin
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
unknown
https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
unknown
https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
unknown
http://www.ebuddy.com
unknown
There are 69 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
45.149.241.204
unknown
Germany
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DX92V7
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DX92V7
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DX92V7
time
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
DB2000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3FD2000
trusted library allocation
page read and write
malicious
D97000
heap
page read and write
malicious
F67000
heap
page read and write
malicious
3EC1000
trusted library allocation
page read and write
malicious
3087000
trusted library allocation
page read and write
4FA000
stack
page read and write
7E4E000
stack
page read and write
67DE000
stack
page read and write
B52000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
D78E000
stack
page read and write
7463000
heap
page read and write
87E6000
heap
page read and write
30B7000
trusted library allocation
page read and write
2FF7000
trusted library allocation
page read and write
4950000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
7F7C000
heap
page read and write
323F000
trusted library allocation
page read and write
27EC000
trusted library allocation
page read and write
31BF000
trusted library allocation
page read and write
315B000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
3255000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
7950000
trusted library allocation
page execute and read and write
3271000
trusted library allocation
page read and write
75D0000
heap
page read and write
4AC9000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
2CF2000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
FDE000
stack
page read and write
1367000
heap
page read and write
32A9000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
B3D000
trusted library allocation
page execute and read and write
2F3F000
trusted library allocation
page read and write
BB0000
heap
page read and write
711D000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
13EA000
heap
page read and write
3279000
trusted library allocation
page read and write
47CA000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
3153000
trusted library allocation
page read and write
7FA3000
heap
page read and write
2FC9000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
D68F000
stack
page read and write
505C000
stack
page read and write
320D000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
3155000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
2FFD000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
3277000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
78D6000
trusted library allocation
page read and write
9120000
trusted library allocation
page read and write
32EF000
trusted library allocation
page read and write
325D000
trusted library allocation
page read and write
86EE000
stack
page read and write
30E9000
trusted library allocation
page read and write
4702000
trusted library allocation
page read and write
75AB000
stack
page read and write
400000
system
page execute and read and write
78D0000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
87F0000
heap
page read and write
7B80000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
321F000
trusted library allocation
page read and write
ECA000
heap
page read and write
85D0000
trusted library allocation
page read and write
8D0000
heap
page read and write
3015000
trusted library allocation
page read and write
7F50000
heap
page read and write
3291000
trusted library allocation
page read and write
B33000
trusted library allocation
page execute and read and write
ECE000
stack
page read and write
AFF000
stack
page read and write
31CF000
trusted library allocation
page read and write
325B000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
2F1C000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
CFC000
stack
page read and write
EC0000
heap
page read and write
FE0000
heap
page read and write
B28000
heap
page read and write
45D000
system
page execute and read and write
32DF000
trusted library allocation
page read and write
7680000
heap
page read and write
2FD1000
trusted library allocation
page read and write
46E2000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
2F8D000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
2A5E000
stack
page read and write
2E6E000
stack
page read and write
2FD7000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
3103000
trusted library allocation
page read and write
2E60000
heap
page read and write
2F4F000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
490000
heap
page read and write
31AB000
trusted library allocation
page read and write
3065000
trusted library allocation
page read and write
E8C000
heap
page read and write
DB1000
heap
page read and write
130E000
stack
page read and write
31A1000
trusted library allocation
page read and write
330F000
trusted library allocation
page read and write
2CEA000
trusted library allocation
page execute and read and write
3073000
trusted library allocation
page read and write
7D7C000
stack
page read and write
F90000
heap
page read and write
5F7000
stack
page read and write
3CE0000
heap
page read and write
31F5000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
7980000
trusted library allocation
page execute and read and write
306D000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
E9E000
stack
page read and write
46C9000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page execute and read and write
9A70000
trusted library allocation
page read and write
AF4000
stack
page read and write
7890000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
3007000
trusted library allocation
page read and write
12FB000
stack
page read and write
100E000
heap
page read and write
AEF000
stack
page read and write
70F0000
trusted library allocation
page read and write
492C000
stack
page read and write
3289000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
308D000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
B67000
trusted library allocation
page execute and read and write
3121000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
356E000
stack
page read and write
3169000
trusted library allocation
page read and write
7EDC000
heap
page read and write
12CE000
stack
page read and write
31BD000
trusted library allocation
page read and write
B6E000
stack
page read and write
13B6000
heap
page read and write
3059000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
D8E000
stack
page read and write
7E30000
trusted library section
page readonly
2F9F000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
32CF000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
3133000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
32FF000
trusted library allocation
page read and write
2ECA000
trusted library allocation
page read and write
AF2000
stack
page read and write
3267000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
2FEF000
trusted library allocation
page read and write
153E000
stack
page read and write
460000
unkown
page readonly
30C1000
trusted library allocation
page read and write
E00000
heap
page read and write
D88F000
stack
page read and write
8800000
heap
page read and write
3285000
trusted library allocation
page read and write
2D20000
heap
page read and write
7E99000
heap
page read and write
2FDF000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
30E7000
trusted library allocation
page read and write
319B000
trusted library allocation
page read and write
314F000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
9130000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
326D000
trusted library allocation
page read and write
2FE7000
trusted library allocation
page read and write
305D000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
7E50000
heap
page read and write
32C1000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
32B7000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
32AF000
trusted library allocation
page read and write
F60000
heap
page read and write
3299000
trusted library allocation
page read and write
73F0000
heap
page read and write
90D0000
trusted library allocation
page execute and read and write
30F9000
trusted library allocation
page read and write
32C7000
trusted library allocation
page read and write
276E000
stack
page read and write
32E7000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
400000
system
page execute and read and write
DC8E000
stack
page read and write
279A000
trusted library allocation
page read and write
F50000
heap
page read and write
3311000
trusted library allocation
page read and write
9DFE000
stack
page read and write
3269000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
331D000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
2E63000
heap
page read and write
321B000
trusted library allocation
page read and write
134E000
heap
page read and write
29FF000
stack
page read and write
3149000
trusted library allocation
page read and write
3019000
trusted library allocation
page read and write
3343000
trusted library allocation
page read and write
EC5000
heap
page read and write
3177000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
2E68000
heap
page read and write
30BD000
trusted library allocation
page read and write
7D90000
heap
page read and write
7920000
trusted library allocation
page read and write
2D6E000
stack
page read and write
3105000
trusted library allocation
page read and write
D90000
heap
page read and write
7150000
trusted library allocation
page read and write
3333000
trusted library allocation
page read and write
31B7000
trusted library allocation
page read and write
7F2E0000
trusted library allocation
page execute and read and write
71A0000
trusted library allocation
page read and write
306F000
trusted library allocation
page read and write
4A0D000
trusted library allocation
page read and write
DC8000
heap
page read and write
3313000
trusted library allocation
page read and write
99A0000
trusted library allocation
page execute and read and write
695E000
stack
page read and write
B34000
trusted library allocation
page read and write
473000
remote allocation
page execute and read and write
31F7000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
CBE000
stack
page read and write
8590000
trusted library allocation
page execute and read and write
313D000
trusted library allocation
page read and write
DC4E000
stack
page read and write
24D0000
heap
page read and write
84ED000
stack
page read and write
46C5000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
2F41000
trusted library allocation
page read and write
3341000
trusted library allocation
page read and write
E08000
heap
page read and write
3129000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
8AD000
stack
page read and write
31E1000
trusted library allocation
page read and write
681E000
stack
page read and write
2F75000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
AFB0000
trusted library allocation
page read and write
7DFE000
stack
page read and write
B7D000
heap
page read and write
550E000
stack
page read and write
DD8E000
stack
page read and write
400000
system
page execute and read and write
2EC1000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
32E9000
trusted library allocation
page read and write
D7F000
stack
page read and write
ADB000
stack
page read and write
32D5000
trusted library allocation
page read and write
310D000
trusted library allocation
page read and write
330D000
trusted library allocation
page read and write
9E0000
heap
page read and write
DBF000
stack
page read and write
317B000
trusted library allocation
page read and write
9A3000
heap
page read and write
30B5000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
29FF000
stack
page read and write
2FBF000
trusted library allocation
page read and write
2F3D000
trusted library allocation
page read and write
AD6000
stack
page read and write
3327000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
9EA000
heap
page read and write
7130000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
6CDE000
stack
page read and write
327F000
trusted library allocation
page read and write
3F95000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
31F3000
trusted library allocation
page read and write
928000
heap
page read and write
307D000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
9B5000
heap
page read and write
3159000
trusted library allocation
page read and write
3145000
trusted library allocation
page read and write
305B000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
3297000
trusted library allocation
page read and write
32BD000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
2A10000
heap
page read and write
31F1000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
31DF000
trusted library allocation
page read and write
320F000
trusted library allocation
page read and write
2FD5000
trusted library allocation
page read and write
2F53000
trusted library allocation
page read and write
91E000
stack
page read and write
87C8000
heap
page read and write
32ED000
trusted library allocation
page read and write
366F000
stack
page read and write
3013000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
31A7000
trusted library allocation
page read and write
320B000
trusted library allocation
page read and write
32CD000
trusted library allocation
page read and write
7BC0000
heap
page execute and read and write
78E0000
trusted library allocation
page read and write
3233000
trusted library allocation
page read and write
999000
heap
page read and write
134A000
heap
page read and write
300F000
trusted library allocation
page read and write
3147000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
1340000
heap
page read and write
2F39000
trusted library allocation
page read and write
3093000
trusted library allocation
page read and write
B4D000
trusted library allocation
page execute and read and write
2F73000
trusted library allocation
page read and write
789B000
trusted library allocation
page read and write
32D7000
trusted library allocation
page read and write
DB4D000
stack
page read and write
31D9000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
B6B000
trusted library allocation
page execute and read and write
2F4B000
trusted library allocation
page read and write
78B1000
trusted library allocation
page read and write
3339000
trusted library allocation
page read and write
3001000
trusted library allocation
page read and write
31D3000
trusted library allocation
page read and write
2791000
trusted library allocation
page read and write
3225000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
9A7F000
trusted library allocation
page read and write
3193000
trusted library allocation
page read and write
70F4000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
2F6C000
trusted library allocation
page read and write
2F37000
trusted library allocation
page read and write
D8C0000
trusted library allocation
page execute and read and write
30D1000
trusted library allocation
page read and write
CFC000
stack
page read and write
4EC0000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
31AD000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
DE7000
stack
page read and write
DEE000
heap
page read and write
1320000
trusted library allocation
page read and write
3071000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
31E5000
trusted library allocation
page read and write
32B1000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
6D1E000
stack
page read and write
32A5000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
D98000
heap
page read and write
3DE1000
heap
page read and write
456000
system
page execute and read and write
333B000
trusted library allocation
page read and write
32B5000
trusted library allocation
page read and write
2F5C000
trusted library allocation
page read and write
71A2000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
710E000
trusted library allocation
page read and write
319F000
trusted library allocation
page read and write
324D000
trusted library allocation
page read and write
32C9000
trusted library allocation
page read and write
451000
unkown
page readonly
30A9000
trusted library allocation
page read and write
3099000
trusted library allocation
page read and write
32F5000
trusted library allocation
page read and write
332D000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
3247000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
EDE000
stack
page read and write
3337000
trusted library allocation
page read and write
133A000
heap
page read and write
2F8B000
trusted library allocation
page read and write
13B8000
heap
page read and write
3048000
trusted library allocation
page read and write
10016000
direct allocation
page execute and read and write
B62000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
78BD000
trusted library allocation
page read and write
6A5E000
stack
page read and write
3335000
trusted library allocation
page read and write
31B9000
trusted library allocation
page read and write
332B000
trusted library allocation
page read and write
7960000
heap
page read and write
CE9000
stack
page read and write
3009000
trusted library allocation
page read and write
143D000
heap
page read and write
2FC3000
trusted library allocation
page read and write
D80000
heap
page read and write
9530000
heap
page read and write
307B000
trusted library allocation
page read and write
30D5000
trusted library allocation
page read and write
30EB000
trusted library allocation
page read and write
2F45000
trusted library allocation
page read and write
31A9000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
7640000
heap
page read and write
3295000
trusted library allocation
page read and write
3243000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
70AC000
stack
page read and write
2A00000
heap
page read and write
3063000
trusted library allocation
page read and write
332F000
trusted library allocation
page read and write
3213000
trusted library allocation
page read and write
31B3000
trusted library allocation
page read and write
7F60000
heap
page read and write
2F77000
trusted library allocation
page read and write
32F3000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
9152000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
3183000
trusted library allocation
page read and write
32A7000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
4F2E000
stack
page read and write
2F51000
trusted library allocation
page read and write
3257000
trusted library allocation
page read and write
322F000
trusted library allocation
page read and write
30DF000
trusted library allocation
page read and write
3179000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
3245000
trusted library allocation
page read and write
31C7000
trusted library allocation
page read and write
3237000
trusted library allocation
page read and write
32F9000
trusted library allocation
page read and write
27D3000
heap
page read and write
E20000
heap
page read and write
2D60000
heap
page read and write
4893000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
312D000
trusted library allocation
page read and write
30C3000
trusted library allocation
page read and write
9D0000
heap
page read and write
E00000
heap
page read and write
70FB000
trusted library allocation
page read and write
3281000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
3315000
trusted library allocation
page read and write
473000
remote allocation
page execute and read and write
DD90000
heap
page read and write
139E000
heap
page read and write
7410000
trusted library allocation
page read and write
2FAD000
trusted library allocation
page read and write
316F000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
B90000
trusted library allocation
page execute and read and write
3115000
trusted library allocation
page read and write
322D000
trusted library allocation
page read and write
3205000
trusted library allocation
page read and write
7894000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
30C7000
trusted library allocation
page read and write
7F88000
heap
page read and write
31A5000
trusted library allocation
page read and write
7B73000
heap
page read and write
B20000
trusted library allocation
page read and write
2C25000
trusted library allocation
page read and write
E50000
heap
page read and write
BA5000
heap
page read and write
2CE2000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
2C36000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
1330000
heap
page read and write
7690000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
9CE000
stack
page read and write
131D000
trusted library allocation
page execute and read and write
DFFB000
stack
page read and write
3061000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
476000
remote allocation
page execute and read and write
2F90000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
4E0000
heap
page read and write
2EAC000
stack
page read and write
30A5000
trusted library allocation
page read and write
3323000
trusted library allocation
page read and write
3195000
trusted library allocation
page read and write
78AE000
trusted library allocation
page read and write
470000
remote allocation
page execute and read and write
31E9000
trusted library allocation
page read and write
2EDC000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
7972000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
B5A000
trusted library allocation
page execute and read and write
30D3000
trusted library allocation
page read and write
473000
system
page execute and read and write
78F0000
trusted library allocation
page read and write
FCF000
stack
page read and write
2FF5000
trusted library allocation
page read and write
78B6000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
30FB000
trusted library allocation
page read and write
3027000
trusted library allocation
page read and write
2EB0000
heap
page execute and read and write
DEE000
stack
page read and write
30F7000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
3137000
trusted library allocation
page read and write
32B3000
trusted library allocation
page read and write
4D6F000
stack
page read and write
2FD3000
trusted library allocation
page read and write
DAE000
heap
page read and write
6A70000
trusted library allocation
page execute and read and write
7B70000
heap
page read and write
DF0000
heap
page execute and read and write
7650000
trusted library section
page read and write
2FCD000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
4B85000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
167F000
stack
page read and write
3283000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
31E7000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
143A000
heap
page read and write
333F000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
3231000
trusted library allocation
page read and write
860000
heap
page read and write
31DB000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
3791000
trusted library allocation
page read and write
3139000
trusted library allocation
page read and write
2FF3000
trusted library allocation
page read and write
312F000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
D40000
heap
page read and write
316B000
trusted library allocation
page read and write
13B0000
heap
page read and write
333D000
trusted library allocation
page read and write
7670000
trusted library section
page readonly
92C000
stack
page read and write
BA0000
heap
page read and write
2FFB000
trusted library allocation
page read and write
3197000
trusted library allocation
page read and write
6BDE000
stack
page read and write
1810000
heap
page read and write
315F000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
30CD000
trusted library allocation
page read and write
947000
heap
page read and write
32EB000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
329D000
trusted library allocation
page read and write
4DE000
stack
page read and write
32E1000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
7630000
trusted library allocation
page read and write
3287000
trusted library allocation
page read and write
31DD000
trusted library allocation
page read and write
1160000
heap
page read and write
2F79000
trusted library allocation
page read and write
71B0000
trusted library allocation
page execute and read and write
8FA000
stack
page read and write
32A3000
trusted library allocation
page read and write
1120000
heap
page read and write
86F0000
heap
page read and write
B70000
heap
page read and write
31F9000
trusted library allocation
page read and write
45C000
system
page execute and read and write
13AD000
heap
page read and write
2780000
heap
page read and write
2FE9000
trusted library allocation
page read and write
9F0000
heap
page read and write
B20000
heap
page read and write
53C0000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
2F57000
trusted library allocation
page read and write
115F000
stack
page read and write
85E5000
heap
page read and write
2F50000
heap
page read and write
2FAB000
trusted library allocation
page read and write
3275000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
11CE000
stack
page read and write
DCA000
heap
page read and write
6E1E000
stack
page read and write
3165000
trusted library allocation
page read and write
329F000
trusted library allocation
page read and write
7E34000
trusted library section
page readonly
10000000
direct allocation
page read and write
3011000
trusted library allocation
page read and write
7644000
heap
page read and write
3229000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page execute and read and write
2FCF000
trusted library allocation
page read and write
2C48000
trusted library allocation
page read and write
324F000
trusted library allocation
page read and write
3127000
trusted library allocation
page read and write
2F5F000
trusted library allocation
page read and write
92E000
heap
page read and write
3057000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
30B3000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
78F5000
trusted library allocation
page read and write
27CD000
heap
page read and write
DDA0000
heap
page read and write
D90000
heap
page read and write
9A00000
trusted library allocation
page execute and read and write
3F99000
trusted library allocation
page read and write
3187000
trusted library allocation
page read and write
8580000
trusted library allocation
page read and write
540E000
stack
page read and write
329B000
trusted library allocation
page read and write
78C2000
trusted library allocation
page read and write
3069000
trusted library allocation
page read and write
3167000
trusted library allocation
page read and write
3123000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
D48E000
stack
page read and write
3119000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
30AB000
trusted library allocation
page read and write
30BF000
trusted library allocation
page read and write
1313000
trusted library allocation
page execute and read and write
3307000
trusted library allocation
page read and write
30C5000
trusted library allocation
page read and write
920000
heap
page read and write
3358000
trusted library allocation
page read and write
1040000
heap
page read and write
5AC000
stack
page read and write
3083000
trusted library allocation
page read and write
7116000
trusted library allocation
page read and write
27B0000
heap
page read and write
308F000
trusted library allocation
page read and write
7111000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
1314000
trusted library allocation
page read and write
2F47000
trusted library allocation
page read and write
691F000
stack
page read and write
3BD0000
heap
page read and write
301D000
trusted library allocation
page read and write
3239000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
31C5000
trusted library allocation
page read and write
71C0000
heap
page execute and read and write
2770000
trusted library allocation
page read and write
352000
unkown
page readonly
AF0000
heap
page read and write
132D000
trusted library allocation
page execute and read and write
8D5000
heap
page read and write
3207000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
31C9000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
762E000
stack
page read and write
2F35000
trusted library allocation
page read and write
31EB000
trusted library allocation
page read and write
3331000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
2B5F000
stack
page read and write
27DD000
heap
page read and write
B56000
trusted library allocation
page execute and read and write
3345000
trusted library allocation
page read and write
3107000
trusted library allocation
page read and write
7122000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
310F000
trusted library allocation
page read and write
3329000
trusted library allocation
page read and write
459000
system
page execute and read and write
313F000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
7180000
trusted library allocation
page execute and read and write
2B1F000
stack
page read and write
31E3000
trusted library allocation
page read and write
53A0000
trusted library allocation
page execute and read and write
2FBD000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
9F00000
trusted library section
page read and write
1374000
heap
page read and write
327B000
trusted library allocation
page read and write
3173000
trusted library allocation
page read and write
310B000
trusted library allocation
page read and write
2F71000
trusted library allocation
page read and write
3055000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
2EE9000
trusted library allocation
page read and write
1000000
heap
page read and write
311F000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
8775000
heap
page read and write
328F000
trusted library allocation
page read and write
7460000
heap
page read and write
7E66000
heap
page read and write
10001000
direct allocation
page execute and read and write
301B000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
350000
unkown
page readonly
2F65000
trusted library allocation
page read and write
30E3000
trusted library allocation
page read and write
2FED000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
309F000
trusted library allocation
page read and write
32AD000
trusted library allocation
page read and write
30D9000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
32E3000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
8793000
heap
page read and write
7E9D000
heap
page read and write
31BB000
trusted library allocation
page read and write
87B7000
heap
page read and write
3101000
trusted library allocation
page read and write
2920000
heap
page read and write
980000
heap
page read and write
2F99000
trusted library allocation
page read and write
B20000
heap
page read and write
2F3B000
trusted library allocation
page read and write
32BB000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
9A75000
trusted library allocation
page read and write
3D59000
heap
page read and write
DD0000
trusted library allocation
page read and write
3171000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
3163000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
F60000
heap
page read and write
30AD000
trusted library allocation
page read and write
3235000
trusted library allocation
page read and write
E3E000
stack
page read and write
3DEA000
heap
page read and write
F2C000
stack
page read and write
7E20000
trusted library allocation
page read and write
316D000
trusted library allocation
page read and write
2940000
heap
page read and write
1382000
heap
page read and write
2F93000
trusted library allocation
page read and write
32D3000
trusted library allocation
page read and write
D4CE000
stack
page read and write
3135000
trusted library allocation
page read and write
E0FC000
stack
page read and write
2FE3000
trusted library allocation
page read and write
7EB5000
heap
page read and write
2F7B000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
3077000
trusted library allocation
page read and write
6FAC000
stack
page read and write
3185000
trusted library allocation
page read and write
E7C000
stack
page read and write
324B000
trusted library allocation
page read and write
963000
heap
page read and write
2F97000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
303C000
trusted library allocation
page read and write
8570000
heap
page read and write
EBE000
stack
page read and write
3097000
trusted library allocation
page read and write
7BB0000
heap
page read and write
3003000
trusted library allocation
page read and write
3199000
trusted library allocation
page read and write
7D4D000
stack
page read and write
331F000
trusted library allocation
page read and write
31A3000
trusted library allocation
page read and write
31B5000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
F70000
heap
page read and write
309B000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
41B000
system
page execute and read and write
326B000
trusted library allocation
page read and write
9D5000
heap
page read and write
2F59000
trusted library allocation
page read and write
32C3000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
30AF000
trusted library allocation
page read and write
86F7000
heap
page read and write
850000
heap
page read and write
7CC000
stack
page read and write
98F0000
heap
page read and write
7FC80000
trusted library allocation
page execute and read and write
1180000
heap
page read and write
30CB000
trusted library allocation
page read and write
32B9000
trusted library allocation
page read and write
31AF000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
9EC000
stack
page read and write
3325000
trusted library allocation
page read and write
3215000
trusted library allocation
page read and write
2FCB000
trusted library allocation
page read and write
2E6A000
heap
page read and write
3079000
trusted library allocation
page read and write
28FF000
stack
page read and write
7970000
trusted library allocation
page read and write
7190000
heap
page read and write
2CE6000
trusted library allocation
page execute and read and write
2F43000
trusted library allocation
page read and write
78D4000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
2F85000
trusted library allocation
page read and write
D00000
heap
page read and write
2FD9000
trusted library allocation
page read and write
85E0000
heap
page read and write
3263000
trusted library allocation
page read and write
31D5000
trusted library allocation
page read and write
32F7000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
30D7000
trusted library allocation
page read and write
3203000
trusted library allocation
page read and write
2775000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
32BF000
trusted library allocation
page read and write
There are 876 hidden memdumps, click here to show them.